home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
virus
/
virusl2
/
virusl2.116
< prev
next >
Wrap
Text File
|
1995-01-03
|
12KB
|
241 lines
VIRUS-L Digest Tuesday, 16 May 1989 Volume 2 : Issue 116
Today's Topics:
"Virus-Proof" PC - an oxymoron?
Certus (PC) disagreement
Comment on Stop a BOOT virus at boot time (PC)
Certus (PC)
PC Virus List
---------------------------------------------------------------------------
Date: Mon, 15 May 89 10:26:04 EDT
From: luken@ubu.cc.lehigh.edu (Kenneth R. van Wyk)
Subject: "Virus-Proof" PC - an oxymoron?
I just saw this in the May 1989 Byte magazine (page 65):
"The Immune System, a DOS-based 80286 computer, is designed for
security by one of the largest computer security companies in the
nation.
Along with some things you'd expect on a standard clone, such as 1 Mb
of RAM, a 1.2 Mb 5 1/4 inch floppy disk drive, and a 40 Mb hard disk
drive, there's a 'virus-proof' feature that keeps unauthorized .EXE
and .COM files from entering or running on the system.
There's also a modem package that purports to secure and encrypt
real-time conversations, as well as provide a system-use audit trail,
a system-access audit trail, and nearly 25 more security features.
American Computer Security Industries has even gone so far as to
secure the clock so only specified users can set or change the time."
Sounds like quite a claim. Anyone have any more specific information
or comments?
Ken
------------------------------
Date: Mon, 15 May 89 13:42:52 EDT
From: "W. K. (Bill) Gorman" <34AEJ7D@CMUVM.BITNET>
Subject: Certus (PC) disagreement
Disagree? With what? I reported precisely what happened when this
routine was evaluated here. One installation went flawlessly, the
next produced the events previously reported. I am certainly glad
to hear of the experiences of others with this package - but since
I was not with tham at the time, I cannot "disagree" with their re-
sults any more than they can "disagree" with mine. We each report
the results of our investigations, be they convergent or divergent,
according to our perceptions at the time. :-)
^^^^^^^^^ ^^ ^^^ ^^^^^^^^^^^ ^^ ^^^ ^^^^
.........................................................................
|W. K. "Bill" Gorman Foust Hall # 5 |
|PROFS System Administrator E-Mail & Message Computer Services |
|Central Michigan University Encryption/Security Mt. Pleasant, MI 48859|
|34AEJ7D@CMUVM.BITNET Virus Countermeasures (517) 774-3183 |
|_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_|
These comments reflect personal opinions held at the time this was written.
Copyright (C) 1989 W. K. Gorman. All rights reserved.
------------------------------
Date: Mon, 15 May 1989 13:47:12 EDT
From: Steven C. Woronick <XRAYSROK@SBCCVM.BITNET>
Subject: Comment on Stop a BOOT virus at boot time (PC)
Stanley Fragakis suggests altering boot sectors so that the boot
program over-writes everything in memory with F4FA, but this of course
kills the machine, should you attempt to boot from such a disk(ette).
So I must assume that the intention is to do this only to non-system
diskettes which nobody in their right mind would want to boot from
anyway (although some of us try). Hence, the penalty for trying to
boot a non-system diskette is no longer the usual message, but a
(temporarily) dead computer which must be powered down and back up
again. Of course, going through this a few times ought to be good
memory-training for remembering to remove non-system diskettes before
re-booting (ironically, if you remembered not to do this, all the
time, then it would be entirely unnecessary). I don't however
understand the concern over halting the PC in a proper manner if it's
dead anyway. Correct me if I'm wrong.
Steven C. Woronick | Disclaimer: These are my own opinions.
Physics Dept. | Check it out for yourself!
SUNY at Stony Brook |
Stony Brook, NY 11794 |
Acknowledge-To: <XRAYSROK@SBCCVM>
------------------------------
Date: Mon, 15 May 89 16:29 EDT
From: "J. D. Abolins" <OJA@NCCIBM1.BITNET>
Subject: Certus (PC)
While I have not tested FoudationWare's CERTUS package, I have tested
two versions of its predecessors (VACCINE and CORPORATE VACCINE).
With each version improvements were definitely made. When I tested
VACCINE, I had it crash during installation due to insufficient disk
space. When that happens, one cannot move forward nor backwards, so to
say. Regular software will not run because VACCINE has not approved it
and VACCINE could not be uninstall using its uninstall utility unless
it was properly installed. In CORPORATE VACCINE, the manual addresses
this and other problems.
My overall impression of FoundationWare's products is that they are
dealing with various methods of protection (fine) but they are very
strict and require much "fine-tuning". They are best used on systems
that need the special security feautures, that are intended for
limited functionality (a word processing/database workstation) and
that are stable (not undergoing constant change).
NOTE: This is my last week at this ID. I am transferring to another
position, one that doesn't entail working with NCC. Although I may
have an alternate BITNET access later on, little is known now. Should
anybody need ot contact me-
By post: J. D. Abolins
301 N. Harrison Street; # 197
Princeton, NJ 08540
By phone: (609) 448-7814
By BITNET via Ralph Mortensen: RMX@NCCIBM1
Thank you.
------------------------------
Date: Tue, 16 May 89 15:08:24 +0300
From: Y. Radai <RADAI1@HBUNOS.BITNET>
Subject: PC Virus List
With the exponential increase in the frequency of new PC virus re-
ports, I've come to feel that I'm getting lost without a catalog of
such viruses. Evidently several others have felt the same way, for
they have prepared, or are in the process of preparing, catalogs which
include descriptions of each of the viruses. My goal is more modest:
to simply *list* them. And that's far from easy considering that
lately I hear of at least one new virus every week (and, of course,
there may be many which I haven't heard of). Anyway, here's what I've
got so far, arranged in (hopefully) chronological order.
PC-DOS/MS-DOS Viruses
=====================
Min # of
Names Strains Type First Appearance
----- ------- ---- ----------------
1. Brain, Pakistani 7 Boot sector Jan 86
2. Merritt, Alameda, Yale 7 Boot sector Apr? 87
3. South African, Friday 13th 2 COM D 87
4. Lehigh 2 COMMAND.COM Nov 87
5. Vienna, Austrian 2 COM D 648 Dec? 87
6. Israeli, Friday-13, Jerusalem 9 COM/EXE R 1813/1808 Dec 87
7. April-1-Com 1 COM R 897 Jan 88
8. April-1-Exe 1 EXE R 1488 Jan 88
9. Ping-Pong, Bouncing-Ball, Italian 2 Boot sector Mar 88
10. Dos-62, Unesco 2 COM D Apr 88
11. Marijuana, Stoned, New Zealand, 2 Boot sector; Early 88
Australian partition record on hard disk
12. Cascade, Autumn, Blackjack 6 COM R 1701/1704 Sep 88 (87?)
13. Agiplan 1 COM 1536 Oct 88
14. Oropax, Music 1 COM RD 2756 to 2806 Feb 89
15. Venezuelan, Den Zuk, Search 6 Boot sector Early 89?
16. dBASE 1 COM/EXE R Mar 89
17. DataCrime 2? COM D 1168 (1280?) Mar 89
18. Missouri 1 ? Apr 89
19. Nichols 2? Boot sector ?
20. 405 1 COM DO 405 Apr? 89
--
Total # of strains 58
Notes:
1. In the "Type" column, "COM" or "EXE" indicates the type of files
infected. "R" stands for "resident", meaning that when an infected
program is run the virus makes itself RAM-resident (hooking one or
more interrupts); usually such a virus infects each subsequently
executed program (of the appropriate type, e.g. COM files). "D" stands
for "direct", meaning that it searches the disk for an uninfected file
and infects it; normally such a virus does not stay resident. (How-
ever, it is possible for a virus to be both resident and direct in
this sense, as in the case of the Oropax.) "O" indicates that the
virus overwrites the beginning of the file instead of appending or
prepending itself to it. The number(s) after the "R" or "D" indicate
the number of bytes by which the virus extends files which it infects;
the number after the "O" is the number of bytes overwritten.
2. I include only those viruses which have spread publicly, as
opposed to localized test viruses (of which there may be hundreds).
3. Questionable cases: (a) Although I have included the dBASE virus
reported by Ross Greenberg, Jim Goodwin claims that it does not repli-
cate and hence is not a virus. But it's possible that Jim and Ross
are talking about two different things. (b) Similarly, I have heard
of spreadsheet viruses which occasionally change a value by a small
amount, but I have not included them in the table. Jim says that the
Lotus 123 virus does not replicate either, but again it's possible
that he's speaking of something else.
A difficult question is when to say that two given viruses are
(a) distinct viruses, (b) different strains of the same virus, or (c)
the same strain of the same virus. I have adopted the following rule:
If one virus has apparently been obtained from the other by improving
the code in some sense, then we have case (b). If the code is the
same, and the only differences are messages or other strings, then we
have case (c). However, if something which makes a more important
difference in the behavior, such as the target date or the triggering
value of the number of infections, has been changed, then I classify
it as case (b). Otherwise (i.e. if the code is significantly differ-
ent), we have case (a).
I'm sure there will be disagreements with my table on certain points,
particularly the dates. In any case, corrections and additions are
welcome. (Please send your corrections directly to me; I'll post an
updated version of this table whenever the need arises.)
For those interested in descriptions of these viruses, 11 of them
are described in Jim Goodwin's catalog. (He says that his catalog
describes 48 viruses, but he is counting each strain of each virus
separately.) Dave Ferbrache has rearranged Jim's catalog so that all
strains of the same virus are grouped together. He has also added a
few more viruses and made the resulting document available on the
Heriot-Watt server.
There are several additional catalogs in existence or in prepara-
tion. One is currently being prepared by the Virus Test Center at the
Univ. of Hamburg under the direction of Prof. Klaus Brunnstein. An-
other is being prepared by David Ferbrache (his will include algo-
rithms or pseudo-code for each of the viruses).
Finally, acknowledgments: Since I have only 7 viruses in my posses-
sion at present, I have obviously had to draw on information provided
by others. Postings in VIRUS-L are too numerous to mention individual
names, but among those who have corresponded with me personally, I
would like to thank Dave Ferbrache, Alan Solomon, Klaus Brunnstein,
Bernd Fix, and Otto Stolz.
Y. Radai
Hebrew Univ. of Jerusalem
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253